Cited By
View all- Kiyoshima S(2019)Non-black-box Simulation in the Fully Concurrent Setting, RevisitedJournal of Cryptology10.1007/s00145-018-09309-532:2(393-434)Online publication date: 1-Apr-2019
- Savage SLie DMannan MBackes MWang X(2018)Lawful Device Access without Mass Surveillance RiskProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243758(1761-1774)Online publication date: 15-Oct-2018
- Jin HZhou KLuo Y(2018)A framework with data-centric accountability and auditability for cloud storageThe Journal of Supercomputing10.1007/s11227-018-2504-574:11(5903-5926)Online publication date: 1-Nov-2018
- Show More Cited By